Nowadays, the growth and development of artificial intelligence is more evident than any other time. Consequently, the development of machine vision systems in the industry has been studied extensively. The provision ...
Nowadays, the growth and development of artificial intelligence is more evident than any other time. Consequently, the development of machine vision systems in the industry has been studied extensively. The provision of a high-level quality control system based on vision inspection in production lines is an important issue. It not only can increase the efficiency, but also derives the necessary tools to gather information about technical errors and faults in the target system. In this paper, we focus on the vision inspection of bottle caps in drink factories using convolutional neural networks. There are different cap encapsulation statuses which are classified as Normal Cap, Unfixed Cap, and No Cap. According to these classes, we can make a decision between either acceptance or rejection of a given bottle. Achieved results show that our optimized fine-tuning method based on the VGG-19 as an End-to-End deep learning approach can lead to more than 99% accuracy.
—Mouse dynamics is a potential means of authenticating users. Typically, the authentication process is based on classical machine learning techniques, but recently, deep learning techniques have been introduced for t...
详细信息
The recent introduction by Belafhal et al. [Opt. and Photon. J. 5, 234-246 (2015)] of mth-order Olver beams as a novel class of self-accelerating nondiffracting solutions to the paraxial equation is a direct contradic...
详细信息
The recent introduction by Belafhal et al. [Opt. and Photon. J. 5, 234-246 (2015)] of mth-order Olver beams as a novel class of self-accelerating nondiffracting solutions to the paraxial equation is a direct contradiction to the seminal work of Berry and Balazs who determined that the infinite-energy Airy wave packet is the only accelerating nondiffracting solution to the (1 + 1)D Schrödinger equation. It is shown in this note that the work of Belafhal et al. is valid only for m=0, which coincides with the Airy solution.
We propose a decentralized digital contact tracing service that preserves the users’ privacy by design while complying to the highest security standards. Our approach is based on Bluetooth and measures actual encount...
详细信息
In this paper, we propose a privacy-preserving medical treatment system using nondeterministic finite automata (NFA), hereafter referred to as P-Med, designed for the remote medical environment. P-Med makes use of the...
详细信息
For the data analysis in the mass data, the data processing ability of the recommendation system is very high. Various kinds of high performance computing frameworks are produced with the Spark, and the computing abil...
详细信息
We find that we made a mistake in the estimation of the H2O2 concentration by the colorimetric method in our previous paper (J. Lin et al., Eur. Phys. J. D (2020) 74: 80) [1].
We find that we made a mistake in the estimation of the H2O2 concentration by the colorimetric method in our previous paper (J. Lin et al., Eur. Phys. J. D (2020) 74: 80) [1].
Server and Network Assisted Dynamic adaptive streaming over HTTP (SAND) is a promising technology to cope with the dramatic increase in video streaming traffic. The new emerging Mobile Edge Computing (MEC) paradigm ma...
详细信息
ISBN:
(数字)9781728109626
ISBN:
(纸本)9781728109633
Server and Network Assisted Dynamic adaptive streaming over HTTP (SAND) is a promising technology to cope with the dramatic increase in video streaming traffic. The new emerging Mobile Edge Computing (MEC) paradigm may further facilitate bitrate adaptation and video transcoding in a SAND system with the help of local edge servers. A critical issue in MEC-SAND framework is to guarantee Quality of Experience (QoE) for clients while achieving efficient utilization of edging network resources. In this paper, we aim to develop an adaptive video delivery scheme to minimize the delay in MEC assisted ultra-dense networks. In our scheme, each client is mapped to a server that better fits its requirements and transmission condition, and a bitrate selection mechanism is exploited to decide the best video version for the client. Besides, time-consuming transcoding tasks are carefully scheduled considering edge computing capacity. We formulate a Mix-Integer Non-Linear Programming (MINLP) problem to jointly determine cell association, bitrate adaption, and computing resource allocation. We exploit the generalized Benders decomposition method to reduce the solving complexity of the formulated problem. Numerical results validate the effectiveness and efficiency of the proposed scheme.
Text passwords are the most widely used authentication methods and will also be used in the future. Text passwords can be regarded as meaningful strings, and deep learning methods have an advantage of text processing....
详细信息
ISBN:
(数字)9781665403924
ISBN:
(纸本)9781665403931
Text passwords are the most widely used authentication methods and will also be used in the future. Text passwords can be regarded as meaningful strings, and deep learning methods have an advantage of text processing. LSTM, RNN, GAN and other deep learning models have been using in password guessing and password strength measurements. In the paper, we make a survey on state-of-the-art deep learning methods for password guessing and password strength evaluation, including password pattern extraction, candidate password generation and password strength measurement. Compared with traditional methods, neural networks based methods can achieve better results and performance.
暂无评论